Zero-Day Flaws Discovered in SCADA Systems

An Italian security researcher recently disclosed details about several zero-day vulnerabilities in supervisory control and data acquisition (SCADA) systems from several vendors.

The discovery -- the second such disclosure by researcher Luigi Auriemma this year -- is likely to reinforce concerns about weaknesses in the nation's critical infrastructure.

The most recent vulnerabilities affect SCADA products from Rockwell Automation, Cogent DataHub, Measuresoft and Progea, among other vendors.

Most of the vulnerabilities are remote code execution flaws that allow attackers to run code on the systems, and some of the flaws are easy to exploit, Auriemma said. At least three of the vendors have already issued fixes, and Rockwell is working on one, he said.

SCADA systems are used to control critical equipment at power plants, manufacturing facilities, water treatment plants and elsewhere. Security analysts fear that attacks against such systems could cripple critical infrastructure, including the electric grid and water supplies.

The Stuxnet worm, which exploited a weakness in a Siemens control system to disrupt operations at an Iranian nuclear power plant, is often cited as an example of the kind of threat that can be unleashed upon vulnerable SCADA systems.

This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.

Read more about security in Computerworld's Security Topic Center.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags siemensRockwell Automation

More about RockwellSiemensTopic

Show Comments
[]